man-pages/man5/securetty.5

44 lines
1.6 KiB
Groff
Raw Normal View History

2004-11-03 13:51:07 +00:00
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de), Fri Apr 2 11:32:09 MET DST 1993
.\"
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
.\"
.\" The GNU General Public License's references to "object code"
.\" and "executables" are to be interpreted as the output of any
.\" document formatting or typesetting system, including
.\" intermediate and printed output.
.\"
.\" This manual is distributed in the hope that it will be useful,
.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
.\" License along with this manual; if not, write to the Free
.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
.\" USA.
.\"
.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu)
.TH SECURETTY 5 1992-12-29 "Linux" "Linux Programmer's Manual"
.SH NAME
securetty \- file which lists ttys from which root can log in
.SH DESCRIPTION
The file
.I /etc/securetty
is used by (some versions of)
.BR login (1).
The file contains the device names of tty lines
(one per line, without leading
.IR /dev/ )
on which root is allowed to login.
See
.BR login.defs (5)
if you use the shadow suite.
.SH FILES
.I /etc/securetty
.SH "SEE ALSO"
.BR login (1),
.BR login.defs (5)